-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
{Compute} Bump version disks 2020-05-01, compute 2020-06-01, Double encryption of disk encryption set #14212
Conversation
Compute |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Core LGTM.
Wait for Python SDK release. |
/azp run |
Azure Pipelines successfully started running 2 pipeline(s). |
@@ -934,6 +934,8 @@ def load_arguments(self, _): | |||
c.argument('disk_encryption_set_name', disk_encryption_set_name) | |||
c.argument('key_url', help='URL pointing to a key or secret in KeyVault.') | |||
c.argument('source_vault', help='Name or ID of the KeyVault containing the key or secret.') | |||
c.argument('encryption_type', arg_type=get_enum_type(['EncryptionAtRestWithPlatformKey', 'EncryptionAtRestWithCustomerKey', 'EncryptionAtRestWithPlatformAndCustomerKeys']), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we use the original enum type instead of hardcode the values ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should
# if encryption_type is not None: | ||
# encryption = Encryption(type=encryption_type, disk_encryption_set_id=disk_encryption_set) | ||
# else: | ||
# encryption = None |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If it's not used anymore, it's better to remove it directly.
I will fix comments and a test failure in another PR. Let's merge version bump first to unblock others' work. |
Description
Resolve #14107
Double encryption at rest is the continuation of server-side encryption (SSE) at rest with customer managed keys (CMK) that we recently announced in GA for managed disks. SSE with CMK allows customers to encrypt the data stored on managed disks at rest with AES 256 encryption. High security sensitive customers who are concerned of the risk associated with any particular encryption algorithm, implementation , or key being compromised can now opt for additional layer of encryption using a different encryption algorithm/mode using platform managed encryption keys.
To enable two layers of encryption at rest for Managed Disks attached to VMs/VMSS, you must must create a DiskEncryptionSet with encryptionType set as EncryptionAtRestWithPlatformAndCustomerKeys and then associate the DiskEncryptionSet to managed disks.
Fix an API version issue of disk encryption set. We should set operation group explicitly!
Testing Guide
Then you can create disk, VM or VMSS with it.
History Notes
[Compute] Bump version disks 2020-05-01, compute 2020-06-01
[Compute] Double encryption of disk encryption set
This checklist is used to make sure that common guidelines for a pull request are followed.
The PR title and description has followed the guideline in Submitting Pull Requests.
I adhere to the Command Guidelines.